2017 15th Annual Conference on Privacy, Security and Trust (PST)最新文献

筛选
英文 中文
A Post-Quantum One Time Signature Using Bloom Filter 基于布隆滤波器的后量子一次性签名
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00056
Masoumeh Shafieinejad, R. Safavi-Naini
{"title":"A Post-Quantum One Time Signature Using Bloom Filter","authors":"Masoumeh Shafieinejad, R. Safavi-Naini","doi":"10.1109/PST.2017.00056","DOIUrl":"https://doi.org/10.1109/PST.2017.00056","url":null,"abstract":"Today's commonly used digital signatures will not be secure if a quantum computer exists. One time signatures (OTS) base security on the one way property of hash functions and will stay secure against an adversary with access to a quantum computer. These schemes however suffer from large public and private keys, as well as large signature size. We propose an OTS that uses Bloom filters to enhance the efficiency without sacrificing security, and show the required sizes of public/private keys, as well as the signature size will all reduce for the same security level.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Segmentation Method for Integrated ICS (Short Paper) 一种新的集成ICS分割方法(短文)
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00020
Khaoula Es-Salhi, D. Espès, N. Cuppens-Boulahia
{"title":"A New Segmentation Method for Integrated ICS (Short Paper)","authors":"Khaoula Es-Salhi, D. Espès, N. Cuppens-Boulahia","doi":"10.1109/PST.2017.00020","DOIUrl":"https://doi.org/10.1109/PST.2017.00020","url":null,"abstract":"The paper presents a new segmentation method for Integrated ICS (Industrial Control Systems) with Corporate system. This new method aims at simplifying security zones identification by focusing only on the system's aspects that are really relevant for segmentation taking into account the system's constraints. Multiple research works have studied IICS (Integrated ICS) segmentation but their solutions are unfortunately not generic enough and do not sufficiently take into account all of the Integrated ICS specificity. Our new method tries to address the problem more efficiently by providing realistic and pragmatic answers to the issue while remaining sufficiently generic to be applied to different types of Integrated ICS.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121813601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimized Secure Data Aggregation in Wireless Sensor Networks 无线传感器网络中优化的安全数据聚合
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00055
Scott A. Thompson, B. Samanthula
{"title":"Optimized Secure Data Aggregation in Wireless Sensor Networks","authors":"Scott A. Thompson, B. Samanthula","doi":"10.1109/PST.2017.00055","DOIUrl":"https://doi.org/10.1109/PST.2017.00055","url":null,"abstract":"With continuing developments in miniaturization and battery design, wireless sensor networks (WSNs) are poised to become common technology in our daily lives. Low cost and flexibility of deployment make WSNs well suited for a wide variety of military, environmental, healthcare, and commercial applications. Some WSN applications, such as monitoring patients in hospitals or weapons targeting in battlefront require endto- end data confidentiality. However, since WSNs are made up of many resource limited sensor nodes, they are typically unable to sustain the high volumes of data transmissions. Using innetwork data aggregation, sensor data from multiple nodes can be combined before being forwarded to neighboring nodes; and thus, energy consumption can be reduced significantly. But in situations where sensor nodes privacy is non-negotiable, data aggregation cannot be implemented at the cost of security. Therefore, there is a strong need for secure data aggregation (SDA) protocols designed to fit the unique properties and considerable constraints of WSNs. Existing end-to-end solutions are either insecure or impractical. In this paper, we propose a novel solution for the secure aggregation of data in WSNs based on probabilistic homomorphic encryption. By combining with a unique encoding function, our solution guarantees the privacy of sensor data, while also greatly reducing communication costs.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126113071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information-Flow Control with Fading Labels 基于衰落标签的信息流控制
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00053
A. Bedford
{"title":"Information-Flow Control with Fading Labels","authors":"A. Bedford","doi":"10.1109/PST.2017.00053","DOIUrl":"https://doi.org/10.1109/PST.2017.00053","url":null,"abstract":"Information-flow control mechanisms generally invest the same amount of resources to protect information of varying importance. In this paper, we introduce the concept of fading labels. Fading labels are security labels that stop propagating their taint after a fixed amount of uses. Their use allows mechanisms to spend more resources on more important information.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database 一种保护隐私的云数据库字符串搜索多模式匹配方案
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00042
Meiqi He, Jun Zhang, Gongxian Zeng, S. Yiu
{"title":"A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database","authors":"Meiqi He, Jun Zhang, Gongxian Zeng, S. Yiu","doi":"10.1109/PST.2017.00042","DOIUrl":"https://doi.org/10.1109/PST.2017.00042","url":null,"abstract":"Searching encrypted database is an important topic as more users want to leverage a third-party cloud system to store and process their data in encrypted form. Despite a lot of wonderful results, there are still a number of unsolved problems. In particular, the problems of pattern matching (not keyword search), e.g. with wildcards, that supports secure boolean queries and how to determine the value of k automatically of a top-k search for different queries on encrypted data are not properly addressed. In this paper, we provide solutions to solve these problems. Also, most existing secure databases employ different encryption functions to support different operators. The only exception is SDB (SIGMOD'2014) that was designed to support data interoperability between integers with a unified encryption scheme so that sophisticated queries can be answered by the database. However, SDB does not support string matching queries. We show that our solutions can be made compatible with SDB to fill this gap. To the best of our knowledge, we are the first to investigate these problems. We prove that our scheme is secure against chosen query attack. We have evaluated the performance of our scheme on large (105 strings) real-world datasets, and showed that our scheme can achieve a high search quality of 99.9% recall and 98.6% accuracy with reasonable response time.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper) 政府机构收集资料的跨国私隐问题(短文件)
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00030
R. Cooper, Hala Assal, S. Chiasson
{"title":"Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper)","authors":"R. Cooper, Hala Assal, S. Chiasson","doi":"10.1109/PST.2017.00030","DOIUrl":"https://doi.org/10.1109/PST.2017.00030","url":null,"abstract":"We conducted an online survey with 366 participants from Canada, India, the UK, and the US to compare privacy concerns and opinions about the collection of personal data by law enforcement and government agencies. We investigated what data participants were willing to share, in what circumstances participants were willing to allow data collection, what procedures companies should follow when they receive requests for customer information, and participants' general concern about their privacy. Statistical analysis showed that nationality and gender had significant impacts on participants' trust and perceptions of their governments, while nationality also impacted participants' willingness to share data under various circumstances. While participants were, on the whole, moderately amendable to data collection by government agencies given a court-ordered warrant, they also indicated a strong desire for increased transparency, and reported a lacklustre knowledge about privacy legislation.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper) 基于匿名的普遍社交网络声誉方案(短文)
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00044
L. Garms, K. Martin, S. Ng
{"title":"Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper)","authors":"L. Garms, K. Martin, S. Ng","doi":"10.1109/PST.2017.00044","DOIUrl":"https://doi.org/10.1109/PST.2017.00044","url":null,"abstract":"Pervasive Social Networks of Strangers are available constantly, connecting users directly with no preexisting relationships. Such networks demand a high level of privacy, as users should be anonymous and their behaviour unlinkable. However, the anonymity of users could lead to abusive messages, spam, or fraud. A possible solution is to keep track of users' reputations, based on feedback from other users. However, the need to collate feedback on user behaviour to form reputations is at odds with the need for privacy. Anonymous and unlinkable feedback is also required, whilst multiple feedbacks given on the same item should be detected. To resolve this, we use group signatures and direct anonymous attestation, to give a reputation-based messaging scheme.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing 从标签到保护:标签驱动的图像共享策略推荐系统
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00047
A. Squicciarini, Andrea Novelli, D. Lin, Cornelia Caragea, Haoti Zhong
{"title":"From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing","authors":"A. Squicciarini, Andrea Novelli, D. Lin, Cornelia Caragea, Haoti Zhong","doi":"10.1109/PST.2017.00047","DOIUrl":"https://doi.org/10.1109/PST.2017.00047","url":null,"abstract":"Sharing images on social network sites has become a part of daily routine for more and more online users. However, in face of the considerable amount of images shared online, it is not a trivial task for a person to manually configure proper privacy settings for each of the images that he/she uploaded. The lack of proper privacy protection during image sharing could raise many potential privacy breaches of people's private lives that they are not aware of. In this work, we propose a privacy setting recommender system to help people effortlessly set up the privacy settings for their online images. The key idea is developed based on our finding that there are certain correlations between a number of generic patterns of image privacy settings and image tags, regardless of the image owners' individual privacy bias and levels of awareness. We propose a multi-pronged mechanism that carefully analyzes tags' semantics and co-presence to derive a set of suitable privacy settings for a newly uploaded image. Our system is also capable of dealing with cold-start problem when there are very few image tags available. We have conducted extensive experimental studies and the results demonstrate the effectiveness of our approach in terms of the policy recommendation accuracy.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133881879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Lelantos: A Blockchain-Based Anonymous Physical Delivery System Lelantos:一个基于区块链的匿名物理交付系统
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00013
R. Altawy, Muhammad H. ElSheikh, A. Youssef, G. Gong
{"title":"Lelantos: A Blockchain-Based Anonymous Physical Delivery System","authors":"R. Altawy, Muhammad H. ElSheikh, A. Youssef, G. Gong","doi":"10.1109/PST.2017.00013","DOIUrl":"https://doi.org/10.1109/PST.2017.00013","url":null,"abstract":"Real world physical shopping offers customers the privilege of maintaining their privacy by giving them the option of using cash, and thus providing no personal information such as their names and home addresses. On the contrary, electronic shopping mandates the use of all sorts of personally identifiable information for both billing and shipping purposes. Cryptocurrencies such as Bitcoin have created a stimulated growth in private billing by enabling pseudonymous payments. However, the anonymous delivery of the purchased physical goods is still an open research problem. In this work, we present a blockchain-based physical delivery system called Lelantos1 that within a realistic threat model, offers customer anonymity, fair exchange and merchant-customer unlinkability. Our system is inspired by the onion routing techniques which are used to achieve anonymous message delivery. Additionally, Lelantos relies on the decentralization and pseudonymity of the blockchain to enable pseudonymity that is hard to compromise, and the distributed consensus mechanisms provided by smart contracts to enforce fair irrefutable transactions between distrustful contractual parties.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124103589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification 基于内积函数加密的数据分类信息泄露分析
2017 15th Annual Conference on Privacy, Security and Trust (PST) Pub Date : 2017-08-01 DOI: 10.1109/PST.2017.00043
D. Ligier, Sergiu Carpov, C. Fontaine, Renaud Sirdey
{"title":"Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification","authors":"D. Ligier, Sergiu Carpov, C. Fontaine, Renaud Sirdey","doi":"10.1109/PST.2017.00043","DOIUrl":"https://doi.org/10.1109/PST.2017.00043","url":null,"abstract":"In this work, we study the practical security of innerproduct functional encryption. We left behind the mathematical security proof of the schemes, provided in the literature, and focus on what attackers can use in realistic scenarios without tricking the protocol, and how they can retrieve more than they should be able to. This study is based on the proposed protocol from [1]. We generalize the scenario to an attacker possessing n secret keys. We propose attacks based on machine learning, and experiment them over the MNIST dataset [2].","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115871159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信